Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    122s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    25/12/2023, 06:29 UTC

General

  • Target

    0bac6e23671f8f591d3329f527369d9b.exe

  • Size

    475KB

  • MD5

    0bac6e23671f8f591d3329f527369d9b

  • SHA1

    adf0579b98b0bcb62e3e853ed260d0c8adb39969

  • SHA256

    b2f0e158b12a041a617b6287fafdeba7b91994db225b73a6002dc6b544d4c0ed

  • SHA512

    f85fa63e907d469475347bb3d665289a3e8666cf75733fe2483d0362a7e3619fc3a1894e5d5f3125a7a7ba5550eebb265f76f49606ac24c426311fb2f0976f82

  • SSDEEP

    3072:+HXzNlUR5SeeL84Gezv7F36LvFBWFCfsiSim4XzPJm0:+DNi5qtLQ5BPsKm4Xv

Score
10/10

Malware Config

Signatures

  • Modifies firewall policy service 2 TTPs 2 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0bac6e23671f8f591d3329f527369d9b.exe
    "C:\Users\Admin\AppData\Local\Temp\0bac6e23671f8f591d3329f527369d9b.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2036
    • C:\Users\Admin\AppData\Local\Temp\0bac6e23671f8f591d3329f527369d9b.exe
      C:\Users\Admin\AppData\Local\Temp\0bac6e23671f8f591d3329f527369d9b.exe
      2⤵
      • Modifies firewall policy service
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1052
      • C:\Users\Admin\Microsoft-Driver-1-82-3875-8725-4265\winsvn.exe
        "C:\Users\Admin\Microsoft-Driver-1-82-3875-8725-4265\winsvn.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:2904
        • C:\Users\Admin\Microsoft-Driver-1-82-3875-8725-4265\winsvn.exe
          C:\Users\Admin\Microsoft-Driver-1-82-3875-8725-4265\winsvn.exe
          4⤵
          • Executes dropped EXE
          PID:1184

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\Microsoft-Driver-1-82-3875-8725-4265\winsvn.exe

    Filesize

    475KB

    MD5

    0bac6e23671f8f591d3329f527369d9b

    SHA1

    adf0579b98b0bcb62e3e853ed260d0c8adb39969

    SHA256

    b2f0e158b12a041a617b6287fafdeba7b91994db225b73a6002dc6b544d4c0ed

    SHA512

    f85fa63e907d469475347bb3d665289a3e8666cf75733fe2483d0362a7e3619fc3a1894e5d5f3125a7a7ba5550eebb265f76f49606ac24c426311fb2f0976f82

  • memory/1052-6-0x0000000000400000-0x000000000040C000-memory.dmp

    Filesize

    48KB

  • memory/1052-17-0x0000000000400000-0x000000000040C000-memory.dmp

    Filesize

    48KB

  • memory/1052-4-0x0000000000400000-0x000000000040C000-memory.dmp

    Filesize

    48KB

  • memory/1052-28-0x0000000002E50000-0x0000000002ED0000-memory.dmp

    Filesize

    512KB

  • memory/1052-8-0x0000000000400000-0x000000000040C000-memory.dmp

    Filesize

    48KB

  • memory/1052-10-0x0000000000400000-0x000000000040C000-memory.dmp

    Filesize

    48KB

  • memory/1052-1-0x0000000000400000-0x000000000040C000-memory.dmp

    Filesize

    48KB

  • memory/1052-14-0x0000000000400000-0x000000000040C000-memory.dmp

    Filesize

    48KB

  • memory/1052-12-0x0000000000400000-0x000000000040C000-memory.dmp

    Filesize

    48KB

  • memory/1052-18-0x0000000000400000-0x000000000040C000-memory.dmp

    Filesize

    48KB

  • memory/2036-15-0x0000000000400000-0x0000000000480000-memory.dmp

    Filesize

    512KB

  • memory/2036-2-0x00000000006F0000-0x0000000000770000-memory.dmp

    Filesize

    512KB

  • memory/2036-0-0x0000000000400000-0x0000000000480000-memory.dmp

    Filesize

    512KB

  • memory/2904-30-0x0000000000400000-0x0000000000480000-memory.dmp

    Filesize

    512KB

  • memory/2904-47-0x0000000000400000-0x0000000000480000-memory.dmp

    Filesize

    512KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.